官术网_书友最值得收藏!

Threats in Kubernetes clusters

With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.

The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:

This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.

主站蜘蛛池模板: 寿光市| 东宁县| 囊谦县| 阜新| 琼结县| 合江县| 灵寿县| 永修县| 达孜县| 龙川县| 曲麻莱县| 石台县| 台中县| 焦作市| 青州市| 合川市| 天柱县| 洞口县| 九龙城区| 新乡县| 古浪县| 巴马| 易门县| 青铜峡市| 行唐县| 岑巩县| 永川市| 沅陵县| 义乌市| 讷河市| 和林格尔县| 东宁县| 凤翔县| 湘阴县| 朝阳县| 贵州省| 新干县| 凉山| 卢龙县| 上杭县| 安乡县|